members

Proximity and power: civil society’s role in democratizing spyware research

Ovi
Ovi
Threat intelligence today is a commodity. It is monetized, gated, and shaped to fit the needs of commercial clients before communities. It's a product, collected and tracked to…
[0x0v1] Newsletter | RightsCon, Meta's "Threat Ideation(??)" and democratizing spyware forensics
Newsletter
members

[0x0v1] Newsletter | RightsCon, Meta's "Threat Ideation(??)" and democratizing spyware forensics

Ovi
Ovi
Targeted Threats Research - South & North Korea (a breakdown of 3 years of civil society threat research in Korea)
Research
members

Targeted Threats Research - South & North Korea (a breakdown of 3 years of civil society threat research in Korea)

Ovi
Ovi
Newsletter
members

[0x0v1] Newsletter | Disabling TLS Certificate Checks in Flutter (BoringSSL) with Frida

Ovi
Ovi
Research

Server-side Device Validation Protocols in High-Security Android Applications - Cashapp, Revolut, Banking, Healthcare, Government etc.

Ovi
Ovi
In my previous two posts about Android emulator bypassing (Android Network Emulator Bypassing for high security apps - Cashapp, Revolut, Banking, Healthcare, Government etc. & Advanced Android Emulator Bypass Techniques…
members

[0x0v1] Newsletter | Avoid WhatToExpect pregnancy app, if you care about your privacy & security

Ovi
Ovi
There's snow outside today as winter closes in, and it's feeling pretty cozy. I'm sitting here with a coffee, starting to write some proposals…
Newsletter
members

[0x0v1] Newsletter | General update November 2024

Ovi
Ovi
REprivacy

RE:privacy | Critical vulnerabilities & privacy concerns in WhatToExpect fertility app

Ovi
Ovi
A high level summary of this issue is provided below. A deep technical breakdown of the vulnerabilities is provided later on to supporters of my work. Executive Summary This research…
Journal

Android Network Emulator Bypassing for high security apps - Cashapp, Revolut, Banking, Healthcare, Government etc.

Ovi
Ovi
Learn to bypass emulator detection in high-security Android apps using network techniques like SSL unpinning, IP spoofing, and request modification. This guide offers practical methods for intercepting traffic and making emulators look like real devices.…